On Thu, Sep 25, 2014 at 12:46:16PM +0100, William Maddler wrote:

> Identica identica anche su vari miei server. Pare sia lo stesso che spamma
> come un dannato.
> 
> >[25/Sep/2014:12:33:19 +0200] "GET /cgi-sys/defaultwebpage.cgi HTTP/1.0"
> >404 382 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"

Per altro o c'e' qualcosa che quelli di cpanel non hanno capito, o non
serve a un tubo [*]?

http://blog.erratasec.com/2014/09/bash-shellshock-bug-is-wormable.html

"Phil Stark said...

Our internal testing showed that /cgi-sys/defaultwebpage.cgi was not vulnerable
by this exploit. It is not written in bash and does not make any calls to bash.

If you have evidence to the contrary, or are aware of any other CGI scripts
distributed by cPanel that are vulnerable we would greatly appreciate it if
you'd open a ticket with us with this information:
[..]"

[*]: non uso e non ho un cCoso comodo per provare

bye,
K.
________________________________________________________
http://www.sikurezza.org - Italian Security Mailing List

Rispondere a